August 9, 2005 UCCSC -- 2005 IT Security at the University of California A New Initiative Jacqueline Craig. Director of Policy Information Resources and.

Slides:



Advertisements
Similar presentations
HIPAA Security Presentation to The American Hospital Association Dianne Faup Office of HIPAA Standards November 5, 2003.
Advertisements

Darton College Information Systems Use Policies. Introduction Dartons Information Systems are critical resources. The Information Systems Use Policies.
CAMP Med Building a Health Information Infrastructure to Support HIPAA Rick Konopacki, MSBME HIPAA Security Coordinator University of Wisconsin-Madison.
JEFF WILLIAMS INFORMATION SECURITY OFFICER CALIFORNIA STATE UNIVERSITY, SACRAMENTO Payment Card Industry Data Security Standard (PCI DSS) Compliance.
SL21 Information Security Board Mission, Goals and Guiding Principles.
The Office of Information Technology Information Security Administrator Kenneth Pierce, Vice Provost for IT and Chief Information Officer.
PCI Compliance Forrest Walsh Director, Information Technology California Chamber of Commerce.
Data Security Standard. What Is PCI ? Who Does It Apply To ? Who Is Involved With the Compliance Process ? How We Can Stay Compliant ?
Security Controls – What Works
Information Security Policies and Standards
Payment Card Industry (PCI) Data Security Standard (DSS) Compliance Commonwealth of Massachusetts Office of the State Comptroller March 2007.
August 9, 2005UCCSC Converting Policy to Reality Building Campus Security Programs Karl Heins -- Director of IT Audit Services Office of the University.
Data Management Awareness January 23, University of Michigan Administrative Information Services Data Management Awareness Unit Liaisons January.
Information Resources and Communications University of California, Office of the President Current Identity Management Initiatives at UC & Beyond: UCTrust.
Information Resources and Communications University of California, Office of the President UCTrust Implementation Experiences David Walker, UCOP Albert.
ITS Offsite Workshop 2002 PolyU IT Security Policy PolyU IT/Computer Systems Security Policy (SSP) By Ken Chung Senior Computing Officer Information Technology.
Contact Center Security Strategies Grant Sainsbury Practice Director, Dimension Data.
Payment Card Industry (PCI) Data Security Standard
Network and Systems Security Security Awareness, Risk Management, Policies and Network Architecture.
Affiliated Information Security Collaborative An Affiliated Enterprise Approach to Information Security Deans and Vice Presidents Meeting April 17, 2014.
Session 3 – Information Security Policies
Information Resources and Communications University of California, Office of the President System-Wide Strategies for Achieving IT Security at the University.
ICT School Policies 6 th November Suggested Policies for Schools Not always a requirement, but useful to cover you, your school and the students.
Peer Information Security Policies: A Sampling Summer 2015.
COMPLYING WITH HIPAA BUSINESS ASSOCIATE REQUIREMENTS Quick, Cost Effective Solutions for HIPAA Compliance: Business Associate Agreements.
NUAGA May 22,  IT Specialist, Utah Department of Technology Services (DTS)  Assigned to Department of Alcoholic Beverage Control  PCI Professional.
Your cybersecurity breach will happen! Here’s what to do to mitigate your risk Thursday, 25 September 2014.
Lesson 8-Information Security Process. Overview Introducing information security process. Conducting an assessment. Developing a policy. Implementing.
General Awareness Training
Network Security Policy Anna Nash MBA 737. Agenda Overview Goals Components Success Factors Common Barriers Importance Questions.
Thomas Levy. Agenda 1.Aims: Reducing Cyber Risk 2.Information Risk Management 3.Secure Configuration 4.Network Security 5.Managing User Access 6.Education.
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
Compliance Management Platform ™. Compliance Management Platform Compliance is the New Marketing – Position yourself to thrive in the new regulatory and.
Chapter 6 of the Executive Guide manual Technology.
Sample Security Model. Security Model Secure: Identity management & Authentication Filtering and Stateful Inspection Encryption and VPN’s Monitor: Intrusion.
General Awareness Training Security Awareness Module 3 Take Action! Where To Go for Help.
April 14, A Watershed Date in HIPAA Privacy Compliance: Where Should You Be in HIPAA Security Compliance and How to Get There… John Parmigiani National.
PRIVACY, SECURITY & ID THEFT PREVENTION - TIPS FOR THE VIGILANT BUSINESS - SMALL BUSINESS & ECONOMIC DEVELOPMENT FORUM October 21, WITH THANKS TO.
PCI Compliance: The Gateway to Paradise PCI Compliance: The Gateway to Paradise.
Unit 6b System Security Procedures and Standards Component 8 Installation and Maintenance of Health IT Systems This material was developed by Duke University,
Security and Privacy Policy The World Has Changed! Common Solutions Group Jack McCredie January 9, 2004.
Instructional & Information Technology Services Fall, Activities and Updates Teresa Macklin Information Security Officer Information Security.
LeToia Crozier, Esq., CHC Vice President, Compliance & Regulatory Affairs Corey Wilson Director of Technical Services & Security Officer Interactive Think.
September 12, 2004 Simplifying the Administration of HIPAA Security Angel Hoffman, RN, MSN Director, Corporate Compliance University of Pittsburgh Medical.
Lesson 9-Information Security Best Practices. Overview Understanding administrative security. Security project plans. Understanding technical security.
Ali Pabrai, CISSP, CSCS ecfirst, chairman & ceo Preparing for a HIPAA Security Audit.
Data Security and Payment Card Acceptance Presented by: Brian Ridder Senior Vice President First National September 10, 2009.
Office of Campus Information Security Driving a Security Architecture by Assessing Risk Stefan Wahe Sr. Information Security Analyst.
Addressing Unauthorized Release of Personal Information at UC Davis August 12, 2003.
Working with HIT Systems
Converting Policy to Reality Designing an IT Security Program for Your Campus 2 nd Annual Conference on Technology and Standards May 3, 2005 Jacqueline.
The IT Vendor: HIPAA Security Savior for Smaller Health Plans?
IT Security Policy: Case Study March 2008 Copyright , All Rights Reserved.
©Dr. Respickius Casmir Network Security Best Practices – Session 2 By Dr. Respickius Casmir.
Lessons Learned from Recent HIPAA Breaches HHS Office for Civil Rights.
Robert Ono Office of the Vice Provost, Information and Educational Technology September 9, 2010 TIF-Security Cyber-safety Plans for 2010.
Chapter 3 Pre-Incident Preparation Spring Incident Response & Computer Forensics.
HIPAA Compliance Case Study: Establishing and Implementing a Program to Audit HIPAA Compliance Drew Hunt Network Security Analyst Valley Medical Center.
Information Security tools for records managers Frank Rankin.
By: Matt Winkeler.  PCI – Payment Card Industry  DSS – Data Security Standard  PAN – Primary Account Number.
HHS Security and Improvement Recommendations Insert Name CSIA 412 Final Project Final Project.
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
© ITT Educational Services, Inc. All rights reserved. IS3220 Information Technology Infrastructure Security Unit 10 Network Security Management.
Payment Card Industry (PCI) Data Security Standard (DSS) Compliance
Information Security Board
Payment Card Industry (PCI) Data Security Standard (DSS) Compliance
IT Development Initiative: Status and Next Steps
Payment Card Industry (PCI) Data Security Standard (DSS) Compliance
County HIPAA Review All Rights Reserved 2002.
Fy ‘08 NETWORK PLANNING TASK FORCE
Presentation transcript:

August 9, 2005 UCCSC IT Security at the University of California A New Initiative Jacqueline Craig. Director of Policy Information Resources and Communications UC Office of the President

August 9, 2005 UCCSC IT Security at the University of California A New Initiative Workgroup Universitywide work group created to recommend initiatives to: –reduce number and severity of future security breaches –identify policy and best practices for education, technology

August 9, 2005 UCCSC IT Security at the University of California A New Initiative Subgroups 1.more effective handling of security incidents 2.protection of sensitive data on desktops, laptops and portable devices 3.communications/ education 4.leadership / accountability

August 9, 2005 UCCSC IT Security at the University of California A New Initiative Final Report Focus on “restricted data” Initiatives identified for: –Leadership - must ensure IT security throughout UC –Management - must ensure the safeguarding of restricted data

August 9, 2005 UCCSC IT Security at the University of California A New Initiative Roles and Responsibilities leadership - initiate mandates to campuses individuals – identifies requirements for accountability units – administering data access policies, permissions, enforcement with standards, conducting security audits …

August 9, 2005 UCCSC IT Security at the University of California A New Initiative Roles and Responsibilities units – assign responsibility for security programs, maintaining data inventories, setting departmental guidelines, procedures, proper handling of security incidents and implementing remediation

August 9, 2005 UCCSC IT Security at the University of California A New Initiative Roles and Responsibilities campus-wide responsibilities –campus guidelines and standards –infrastructure management, such as networks and identity management –data stewardship, protection and management organizations –engage controllers and risk managers

August 9, 2005 UCCSC IT Security at the University of California A New Initiative Roles and Responsibilities university-wide responsibilities –manage an insurance-like fund to reduce local liability costs –provide clear guidelines for handling incidents –pilot audit and forensics teams –data risk management program to support campuses

August 9, 2005 UCCSC IT Security at the University of California A New Initiative Communication and Education launch system-wide campaign to raise awareness campus urged to send communications to their constituencies create training modules adaptable to campus learning environments

August 9, 2005 UCCSC IT Security at the University of California A New Initiative Policy and Compliance Programs revise IS-3 to include –minimum security requirements –standards for allowable use of restricted data –guidelines for security incident handling

August 9, 2005 UCCSC IT Security at the University of California A New Initiative Management Initiatives conduct risk assessments –identify all resources that store or transmit restricted data –identify threats and vulnerabilities implement security plan appropriate to the environment

August 9, 2005 UCCSC IT Security at the University of California A New Initiative Security Plans outline processes and controls needed to enhance security –identify rights of access to data –implement strategies to protect data –train staff improve security incident procedures

August 9, 2005 UCCSC IT Security at the University of California A New Initiative Strategies for Securing Restricted Data encryption must be used –for transit –storage on devices when physical security cannot be provided campuses must implement connectivity standards

August 9, 2005 UCCSC IT Security at the University of California A New Initiative Strategies for Securing Restricted Data minimize storing on devices employ network management tools, such as firewalls, IDS system, vulnerability scanning, and VPNs focus on log management strategies employ appropriate authentication and access controls

August 9, 2005 UCCSC IT Security at the University of California A New Initiative Strategies for Securing Restricted Data implement and test back up controls ensure robust systems management for applications and systems, such as anti-virus and security patch management, close ports, turn off unused services, operate change monitoring tools operate firewalls at both system and network

August 9, 2005 UCCSC IT Security at the University of California A New Initiative Effective Handling of Incidents establish standard incident response procedures conduct appropriate post-security breach investigations recommendations for forensics guidance

August 9, 2005 UCCSC IT Security at the University of California A New Initiative Recommendations Leadership: develop systemwide and campus guidelines University-wide –UC-wide communication campaign –Create templates for communications

August 9, 2005 UCCSC IT Security at the University of California A New Initiative Recommendations Training: create Web-based training module for general purpose use Security Incidents: establish and communicate guidelines for log management

August 9, 2005 UCCSC IT Security at the University of California A New Initiative Recommendations Contract for forensics tools and services Create University-wide security audit and forensics teams Update IS-3

August 9, 2005 UCCSC IT Security at the University of California A New Initiative Recommendations Campus security programs –identify responsible party for oversight –develop campus security programs Encryption –promote campus-wide encryption services –select and contract for tools and technologies

August 9, 2005 UCCSC IT Security at the University of California A New Initiative When will this happen? August - report distributed to Chancellors September - Council of Chancellor’s agenda for discussion and identification of next steps